TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

I Am Releasing Ten Million Passwords

594 pointsby m8urnover 10 years ago

35 comments

tptacekover 10 years ago
Barrett Brown was not convicted merely for linking to data on the web. He was convicted for three separate offenses:<p>1. Acting as a go-between for (presumably Jeremy Hammond) the Stratfor hacker and Stratfor itself, Brown misled Stratfor in order to throw the scent off Hammond. Having intimate knowledge of a crime doesn&#x27;t make one automatically liable for that crime, but does put them in a precarious legal position if they do anything to assist the perpetrators.<p>2. During the execution of a search warrant, Brown helped hide a laptop. Early in the trial, in advancing the legal theory that hiding evidence is permissible so long as that evidence remains theoretically findable in the scope of the search warrant, Brown admitted to doing exactly that, and that&#x27;s a crime for the same reason that it&#x27;s a crime when big companies delete email after being subpoenaed.<p>3. Brown threatened a named FBI agent and that agent&#x27;s children on Twitter and in Youtube videos.<p>The offense tied to Brown&#x27;s &quot;linking&quot; was dismissed.<p>Brown&#x27;s sentence was unjust, but it wasn&#x27;t unjust because he was wrongly convicted by a trigger-happy DOJ; rather, he got an outlandish sentence because he managed to stipulate a huge dollar figure for the economic damage caused by the Stratfor hack, which he became a party to when he helped Hammond.
评论 #9024877 未加载
评论 #9025411 未加载
评论 #9028705 未加载
评论 #9025093 未加载
评论 #9024881 未加载
评论 #9024872 未加载
评论 #9026631 未加载
LeoPantheraover 10 years ago
Fun!<p><pre><code> $ export LC_ALL=&#x27;C&#x27; $ awk &#x27;{ print $2 }&#x27; 10-million-combos.txt | tr &#x27;A-Z&#x27; &#x27;a-z&#x27; | sort | uniq -c | sort -nr | head -n 20 55893 123456 20785 password 13582 12345678 13230 qwerty 11696 123456789 10938 12345 6432 1234 5682 111111 4796 1234567 4191 dragon 3845 123123 3734 baseball 3664 abc123 3655 football 3330 monkey 3206 letmein 3136 shadow 3126 master 3050 696969 3002 michael </code></pre> Edit: I used Wordle[1] to make a wordcloud of the top 1000 passwords: <a href="http://i.imgur.com/FImcPiG.png" rel="nofollow">http:&#x2F;&#x2F;i.imgur.com&#x2F;FImcPiG.png</a><p>[1]: <a href="http://www.wordle.net" rel="nofollow">http:&#x2F;&#x2F;www.wordle.net</a>
评论 #9025068 未加载
评论 #9025020 未加载
评论 #9025114 未加载
评论 #9025177 未加载
评论 #9025050 未加载
评论 #9025541 未加载
评论 #9026223 未加载
评论 #9025873 未加载
评论 #9030472 未加载
评论 #9027568 未加载
meowfaceover 10 years ago
I don&#x27;t understand exactly why it&#x27;s necessary to release usernames along with the passwords, or why it&#x27;s ethical to do so. Stripping the domain portion of email addresses does absolutely nothing when you can find the real email, and other accounts of the victim, by Googling the unique part of the email address.<p>How does tying each password to its corresponding username help with password research, and does the value gained outweigh the cost of someone using this list for malicious purposes?<p>I&#x27;m not saying this should be illegal, but I&#x27;m struggling to understand the intent here.
评论 #9024999 未加载
评论 #9024965 未加载
评论 #9025539 未加载
评论 #9024949 未加载
评论 #9025276 未加载
评论 #9025918 未加载
评论 #9025486 未加载
zarothover 10 years ago
There is an annual &#x27;Passwords&#x27; conference [1], which I attended in 2012, and was blown away by quite how much researchers are able to do with these password lists.<p>Unfortunately, I was equally impressed with what attackers are able to do with them as well. An important point is that attackers tend to have better lists, because they are the ones stealing and cracking them, and these lists make them increasingly better at cracking passwords. Defenders use the lists for all sorts of analysis on how exactly users pick passwords.<p>For example, &quot;complex password policies&quot; have become increasingly popular. But do they actually increase the entropy of the chosen passwords? Surprisingly little, since users will &quot;defeat&quot; the policy by applying easy to guess &quot;munging rules&quot;. Humans being human and such. The thieves have the lists, and learn to apply the munging rules and defeat the policies. Researchers need these lists so they can discover the same weakness and try to react.<p>More recent research looks at things like how effective the password strength indicators are at actually helping users choose stronger passwords. We also learn about how users choose different strength passwords based on the sites they visit and such. This is absolutely fertile ground for research which can improve how we perform authentication.<p>Yet another good use of the lists is in defending against online attacks. E.g. Failed attempts that follow the general probability distribution of the lists are easier to identify as bots.<p>[1] - I think all the talks are posted, although I&#x27;m not sure there&#x27;s a central archive, each conference is identified as Passwords^[Year], e.g. Passwords^14 <a href="https://passwordscon.org/" rel="nofollow">https:&#x2F;&#x2F;passwordscon.org&#x2F;</a>
评论 #9026904 未加载
评论 #9025431 未加载
dj-wonkover 10 years ago
Forgive me for doing so, but allow me to ask some possibly ignorant questions and perhaps play the devil&#x27;s advocate for a moment. What about this release will help? What are the compelling research problems in the space?<p>We know users pick bad passwords. It seems to me the most compelling &quot;problem&quot; is hardly a research question -- isn&#x27;t it about finding ways to encourage users pick strong passwords, not share them between sites, and not put them on sticky notes on their monitors.<p>Ok, putting my charitable hat again... My best guess is that researchers would like some idea about how long it takes to crack some percentage of accounts; e.g. with rainbow tables or other techniques?<p>The author mentioned &quot;Analysis of usernames with passwords is an area that has been greatly neglected and can provide as much insight as studying passwords alone.&quot; What directions might a researcher take this?
评论 #9024967 未加载
评论 #9025087 未加载
stevecaliforniaover 10 years ago
When I first got on the Internet in 1994 I used the same password for everything for the next decade before I became security conscious (now I have a random, strong, unique password for every service).<p>Anyways, that password is not in this list. I have found it in other password dumps before. So, I don&#x27;t know what to think.
评论 #9024952 未加载
评论 #9024931 未加载
评论 #9025236 未加载
评论 #9025237 未加载
totonyover 10 years ago
From the law quoted in the article, wouldn&#x27;t it be illegal to simply make a course about computer security?<p>The teacher willfully (and knowingly) teaches the student about &quot;possible means of access to a protected computer.&quot;<p>Note: According to <a href="http://www.law.cornell.edu/uscode/text/18/1029" rel="nofollow">http:&#x2F;&#x2F;www.law.cornell.edu&#x2F;uscode&#x2F;text&#x2F;18&#x2F;1029</a> teaching is defined as trafficking information (&quot;the term “traffic” means transfer, or otherwise dispose of, to another, or obtain control of with intent to transfer or dispose of; &quot;)
avid8over 10 years ago
Even if this release has no implications for security, I think it may raise legitimate concerns for users&#x27; privacy. No doubt most users expect that their passwords will be known only to themselves. Many of the usernames contain real names, and many more could probably be traced to them. Ian Watkins was found to have &quot;gloated&quot; about his crimes in his password. With time and attention, I wonder whether such &quot;dark secrets&quot; could be found in this list.
评论 #9025189 未加载
_0vzdover 10 years ago
Went ahead and performed a Levenshtein distance analysis from this list, and made a graph of it. Number 8 seems to be the sweet &#x27;secure&#x27; spot that most people latch onto, though the distribution curve is interesting - or very human-like: <a href="http://pp19dd.com/2015/02/levenshtein-distance-10-million-usernames-passwords/" rel="nofollow">http:&#x2F;&#x2F;pp19dd.com&#x2F;2015&#x2F;02&#x2F;levenshtein-distance-10-million-us...</a>
uptownover 10 years ago
How are things like Twitter accounts hacked? Are they generally brute-forced with a list like this, or how do so many of them get compromised?
charlespwdover 10 years ago
For the lazy:<p><pre><code> grep -i &lt;password&gt; 10-million-combos.txt</code></pre>
评论 #9026287 未加载
评论 #9024958 未加载
评论 #9024960 未加载
failed_ideasover 10 years ago
This is great, but if you use a password manager, it&#x27;s very difficult to determine which, if any, of your accounts would be compromised. For myself, this would just be doing a dump and looping a few greps. But for family and friends, does anyone have any ideas for a less technical audience?
评论 #9024992 未加载
评论 #9025727 未加载
评论 #9025118 未加载
yeukhonover 10 years ago
<a href="http://security.stackexchange.com/questions/46625/is-it-legal-to-publish-viticims-password-and-email" rel="nofollow">http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;46625&#x2F;is-it-lega...</a><p>I thought of exactly the same. I was motivated by the password strength meter out there. How can you actually tell a password is strong or not or whether a password is known to attacker or not if you can ask (I was thinking along the line of private information retrieval) privately and get a probability rather than a yes&#x2F;no based on all the known stolen credential out in the Internet (there are many Gbs files you can download)...
jammycakesover 10 years ago
Just a thought here. As far as I can tell, many bona fide security researchers seem to be independent consultants. Would they be less at risk of prosecution if they were handling sensitive data such as user names and passwords under the coverage of universities and&#x2F;or similar accredited institutions operating under protocols as to who can and cannot access the data?<p>It would probably be more security theatre than actual security, but I&#x27;d imagine that it would at least keep the FBI happy.
huevingover 10 years ago
I wish there was an origin with these. A username&#x2F;password combo I use on a ton of sites I don&#x27;t care about is on here. It would be nice to know which is one leaked it.
srcoleover 10 years ago
What sorts of analyses are you guys planning? Maybe: -clustering of passwords. are aspects of the username biased towards certain clusters? -distribution of alphanumeric characters at each position of a password (e.g. 1 is a disproportionately common final character) -differences in password strength between usernames with male and female names
camhenlinover 10 years ago
Man, I hope my password isn&#x27;t in there.
评论 #9024856 未加载
评论 #9024848 未加载
评论 #9024842 未加载
评论 #9024854 未加载
评论 #9024853 未加载
评论 #9024838 未加载
评论 #9024847 未加载
tomkinstinchover 10 years ago
To save a moment of time, here&#x27;s a quick check that won&#x27;t save the password string to your command history:<p>read -e -s -p &quot;Password: &quot; password &amp;&amp; grep -i $password 10-million-combos.txt | wc -l &amp;&amp; password=&quot;&quot;
gayprogrammerover 10 years ago
Woah you are REALLY optimistic about law enforcement agencies wanting to focus on real criminals.<p>But Barrett Brown is not the first or only example.<p>Aaron Swartz is the only example I need to understand what to expect from the various US law enforcement agencies.
评论 #9025866 未加载
评论 #9025408 未加载
forgotX2over 10 years ago
Could someone describe the dataset for me? Is it just two columns with one for usernames and another for passwords? Or is there any other info included? I&#x27;m on mobile right now or else I&#x27;d grab it myself.
评论 #9024974 未加载
评论 #9024972 未加载
20kleaguesover 10 years ago
Way to go buddy! This research is indeed necessary and releasing such a dataset will be beneficial. Maybe it will also bring light to how outdated password based authentication really is.
levlazover 10 years ago
If anyone wants to check their username, I have a searchable DB up now. <a href="https://levlaz.org/passwords" rel="nofollow">https:&#x2F;&#x2F;levlaz.org&#x2F;passwords</a>
sarciszewskiover 10 years ago
&gt; He was close to Anonymous and was in fact their spokesman.<p>Err, no he wasn&#x27;t. He just managed to get a modest amount of attention.
igonvalueover 10 years ago
Is there an http download link that would allow downloading from the browser (or with curl)?
评论 #9025946 未加载
bikamonkiover 10 years ago
It seems very useful for research and also practical uses, like how about a REST API with this dump? get &lt;password&gt; will not only return true if it exists but how common and how weak it is, or will return a false for unique. Is there such a service out there?
评论 #9028383 未加载
评论 #9025113 未加载
评论 #9026358 未加载
评论 #9025456 未加载
评论 #9025019 未加载
tttyover 10 years ago
&gt;Many companies, such as Facebook, also monitor public data dumps to identify user accounts in their user base that may have been compromised and proactively notify users.<p>That is smart!
vaibhavmuleover 10 years ago
Is your password and username in that list?
评论 #9026060 未加载
评论 #9025829 未加载
Kenjiover 10 years ago
I could be relieved that my favourite password isn&#x27;t in there but it&#x27;s already been leaked by stupid, stupid engineers working for Riot (League of Legends video game) who stored it in plaintext and a hacker got it. It is a good practice to regularly change passwords anyways: If you&#x27;re worried that your password is in there, you&#x27;re doing it wrong in the first place.
评论 #9024993 未加载
评论 #9025001 未加载
ommunistover 10 years ago
I thank the post author for releasing this data. I found one of my accounts there and changed password to a more secure one.
oswover 10 years ago
awk &#x27;{ print $2 }&#x27; 10-million-combos.txt | grep 1234 | wc -l<p>only 180896 people have 1234 in their password, thought there would be more
jcm1317over 10 years ago
Hunter6 is used as a password 9 times...
pbhjpbhjover 10 years ago
So this guy found a zero-day that works across different unzip binaries, or what ...!?
jacobsimonover 10 years ago
_ everyone frantically searches for their own usernames _
julianpyeover 10 years ago
Everyone knows the whole email&#x2F;password concept is broken. I believe that overall OAUTH is needed, but it needs a much stronger consumer facing view.
评论 #9024887 未加载
评论 #9025257 未加载
评论 #9024862 未加载
sandwormover 10 years ago
It was a mistake to release this today.<p>Everyone knows that legally questionable moves should always be made on a friday. That allows everyone in government to cool down for a couple days. By the time the weekend is over all the news outlets have moved on to whatever war just started up. You don&#x27;t want some hothead prosecutor tweeting out a threat, forcing himself to follow through later in the week. Nobody picks a fight when 15 minutes away from a weekend.<p>Watch the NSA&#x2F;CIA&#x2F;MIB admissions. They always stage their spying&#x2F;torturing me culpas on friday afternoons.
评论 #9025915 未加载